ProSight Duo Identity Verification
Duo MFA ExpertsProgent's ProSight Duo suite of services integrates advanced access security technology from Duo, a Cisco subsidiary, to offer two-factor authentication services. Two-factor authentication is one of the pillars of modern zero-trust network security strategy. 2FA utilizes separate channel ID verification to provide an additional layer of protection beyond traditional passwords. This counters the most frequent sources of cybersecurity break-ins such as phishing, brute-force password attacks, and stolen credentials.

Duo Two-factor Access Security Consultants

Duo's one-touch Mobile Push app streamlines authentication

Duo's Push App minimizes time and hassle by permitting users to confirm their identity just by touching "Approve" on the validation box on their own iOS or Android smartphone or watch. This single-touch process does away with the need to retrieve an email or text message and transcribe a security code manually.

Duo Certified PartnersProgent's ProSight Duo line consists of three subscription-based services that build on one another. ProSight Duo MFA permits organizations to implement Duo's two-factor authentication platform to guard all applications while offering essential access tools, unified management, and fast endpoint provisioning. ProSight Duo Access supports all the features of ProSight Duo MFA and adds adaptive authentication controls and endpoint health checking. ProSight Duo Beyond adds the ability to identify company as distinct from personal endpoints, deny access to untrusted endpoints, and give users secure and seamless access to your internal apps. Progent is a certified Duo Managed Service Provider and can assist your business to design, implement and manage an advanced ID authentication solution that provides the highest level of access security without disrupting your users.

Two-factor Authentication
Most security break-ins involve compromised passwords. Every managed service offering in Progent's ProSight Duo line of identity validation solutions can reduce your dangerous dependence on password protection by supporting two-factor authentication. With 2FA implemented, when you log into a protected online account and enter your password you are asked to verify your identity by means of a device which you have sole possession of and that uses a separate ("out-of-band") network channel. A broad selection of devices can be utilized as your second form of authentication including an iOS or Android smartphone or watch, a token, a landline telephone, etc. You can enroll several different authentication devices.

Cisco Duo Two-factor Authentication Consultants

ProSight Duo two-factor authentication adds an extra layer of security

After you verify who you are using your out-of-band device, you are permitted to run your application or utilize your VPN or remote desktop service. With the Duo Mobile app's push notification feature enabled, you can simply touch "Approve" on your iOS or Android phone or smart watch. This improves the sign-on experience by making the verification procedure nearly instantaneous. For traditional secondary units, such as a token, you can copy a temporary passcode.

Plans Available with ProSight Duo Services
Progent's ProSight Duo family of subscription-based service offerings include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's network security experts can help your organization to decide which version of ProSight Duo makes the most sense for your requirements.

ProSight Duo MFA Features:

  • 2FA authentication
  • Duo Mobile to push single-tap ID validation for iOS or Android smartphones and wearables
  • ID verification via a Universal 2nd Factor USB device or biometrics
  • Conventional 2FA via a passcode on a token, mobile computer, or issued by a network administrator
  • Self-enrollment and self-management
  • Dashboard displaying all managed devices connected to protected applications
  • Policy enforcement based on app, group
  • Cloud-based single sign-on (SSO) for any applications via an MFA-secured dashboard
ProSight Duo Access Features:
  • All the capabilities included with ProSight Duo
  • Unified Endpoint Visibility shows each networked device, not simply managed endpoints
  • Flag and track unhealthy devices
  • Duo Device Health apps for notebooks and desktops
  • Cybersecurity health visibility for mobile computers
  • Policy enforcement based on geo-location
  • Blocking options for anonymous communication networks like Tor
  • Detection of high-risk or unhealthy networks
  • Health-determined policy decisions for notebooks, PCs and devices
  • Advise users at sigh-on to update their software and security settings
ProSight Duo Beyond Features:
  • All the capabilities included with ProSight Duo Access
  • Detection of corporate-owned vs. BYOD notebooks, desktops and mobile devices
  • Detection of third-party software agents such as anti-virus running on devices
  • Protected access to on-prem websites/apps and SSH (Secure Shell) servers without requiring VPN credential management
  • Verification of both user and device trust
  • Control device access to applications based on enrollment in endpoint management systems
  • Limit mobile access to applications determined by enrollment in mobile device management systems (MDMs)
Read ProSight Duo Access Security Services Datasheet
To download a datasheet about the key capabilities and benefits of ProSight Duo Access Security Services, select:
ProSight Duo access security service plans datasheet. (PDF - 335 KB)

Download Importance of Deploying Advanced Password Management Technology White Paper
To read or download a white paper about the reasons for deploying up-to-date password management tools, click:
Reasons for Deploying Advanced Password Management Technology White Paper. (PDF - 2.3 MB)

How Progent Can Assist You to Create an 2FA System with ProSight Duo
Progent can help you to plan, deploy, maintain and debug a two-factor ID verification system built on ProSight Duo technology. Progent can also help your company to integrate ProSight Duo 2FA services into a cohesive, comprehensive security strategy by delivering expert support for all aspects of advanced cybersecurity tools and services for any mix of cloud-based, on-prem, at-home, and mobile resources and users.

Progent's Cisco-certified CCIE network experts can help you to configure and troubleshoot your Cisco ASA firewalls, switches, VPN devices, and other network infrastructure to work with Cisco Duo's secure access services. Progent's authorized Azure experts, AWS configuration consultants and Google Cloud Platform consulting experts can help your organization to add the security of ProSight Duo two-factor authentication to your cloud-hosted apps. Progent's telecommuter solution specialists can assist your organization to set up safe and reliable remote connectivity for your teleworkers.

Progent also offers rapid guidance from Microsoft 365 Exchange experts, SQL Server consultants, and Microsoft 365 consultants help you to prepare and deploy Duo secure access technology with your key applications. Progent's CISSP-certified cybersecurity consultants and CISM-certified network security specialists can assist your company to evaluate and elevate your corporate-wide cybersecurity profile. Progent also offers ProSight Active Security Monitoring services for AI based endpoint protection powered by SentinelOne.

Additional Managed Services Offered by Progent
In addition to ProSight Duo access security services, Progent offers other low-cost managed service packages that cover key components of your information system like cybersecurity, backup/recovery, and infrastructure management. By working with top-tier technology providers, Progent can offer small and mid-size businesses the benefits of the same cutting-edge technology utilized by worldwide enterprises. Popular managed service plans offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates SentinelOne's next generation behavior analysis technology to defend physical and virtual endpoints against modern malware attacks such as ransomware and file-less exploits, which routinely evade traditional signature-matching AV products. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to address the complete threat progression including blocking, identification, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Microsoft Exchange Filtering
    ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent can also help you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

  • ProSight Data Protection Services (DPS): Managed Backup and Disaster Recovery Services
    Progent has partnered with advanced backup technology companies to create ProSight Data Protection Services, a selection of subscription-based offerings that deliver backup-as-a-service. ProSight DPS products manage and track your backup operations and allow non-disruptive backup and rapid restoration of critical files/folders, applications, system images, plus virtual machines. ProSight DPS lets you recover from data loss caused by equipment failures, natural calamities, fire, cyber attacks such as ransomware, user mistakes, malicious employees, or software glitches. Managed services available in the ProSight Data Protection Services product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent consultant can help you to determine which of these managed backup services are most appropriate for your IT environment.

  • ProSight WAN Watch: Infrastructure Management
    Progent's ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized organizations to map out, track, optimize and troubleshoot their connectivity appliances such as routers, firewalls, and access points plus servers, printers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network diagrams are kept updated, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends notices when problems are discovered. By automating complex management activities, WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, finding appliances that require important software patches, or isolating performance bottlenecks. Learn more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop monitoring service that uses state-of-the-art remote monitoring and management technology to keep your network running efficiently by checking the health of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your designated IT management staff and your assigned Progent consultant so any potential issues can be resolved before they have a chance to disrupt your network. Learn more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can eliminate as much as 50% of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether you're planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Read more about ProSight IT Asset Management service.

  • Progent Active Protection Against Ransomware: AI-based Ransomware Identification and Cleanup
    Progent's Active Protection Against Ransomware is an endpoint protection (EPP) solution that incorporates next generation behavior analysis technology to guard endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which easily get by traditional signature-matching anti-virus tools. Progent ASM services protect on-premises and cloud resources and offers a single platform to address the complete threat lifecycle including filtering, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Find out more about Progent's ransomware defense and cleanup services.

  • Outsourced/Co-managed Help Center: Call Center Managed Services
    Progent's Help Desk services enable your information technology staff to offload Help Desk services to Progent or divide activity for support services seamlessly between your internal support group and Progent's extensive roster of certified IT service technicians, engineers and subject matter experts. Progent's Shared Service Desk offers a smooth supplement to your core network support organization. Client access to the Help Desk, delivery of support, problem escalation, trouble ticket creation and tracking, performance metrics, and maintenance of the support database are cohesive regardless of whether issues are resolved by your corporate support staff, by Progent's team, or a mix of the two. Learn more about Progent's outsourced/co-managed Call Center services.

  • Patch Management: Software/Firmware Update Management Services
    Progent's support services for patch management offer businesses of any size a versatile and affordable solution for assessing, testing, scheduling, implementing, and tracking updates to your ever-evolving information network. Besides optimizing the protection and reliability of your IT network, Progent's software/firmware update management services free up time for your in-house IT team to concentrate on more strategic projects and tasks that derive maximum business value from your network. Learn more about Progent's software/firmware update management services.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is a growing family of real-time reporting plug-ins created to work with the industry's leading ticketing and network monitoring programs such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to highlight and contextualize critical issues like spotty support follow-through or endpoints with out-of-date AVs. By identifying ticketing or network health concerns clearly and in near-real time, ProSight Reporting enhances network value, lowers management hassle, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring platforms.
Contact Progent for Cybersecurity Expertise
If you need expertise for multi-factor authentication or any other facet of network security, call Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • 24 Hour Baltimore Offsite Workforce Collaboration Systems Consulting Experts Baltimore Remote Workforce Collaboration Technology Consultants
  • 24-7 Cisco AnyConnect IT Services Firesight Computer Engineer
  • After Hours Dallas Technical Services Technology Consultants Dallas County
  • After Hours Remote Workers Consultants near Baltimore - Network Security Systems Consulting Services Port of Baltimore Remote Workers Baltimore Assistance - Network Security Solutions Consultants Baltimore Towson
  • Chatsworth-Thousand Oaks, CA Cisco Tech Outsourcing Cisco Network Design and Consulting Chatsworth-Northridge, CA
  • Cisco IT Manager Reading Emergency Cisco Professional Services
  • Cisco NSS2000 Computer Engineer Cisco Small Business series NSS2000 Online Troubleshooting
  • Colorado Springs Telecommuters Management Tools Guidance Colorado Springs At Home Workforce Management Tools Consulting Colorado Springs Fort Carson
  • Computer Security Firewall Rockville-Montgomery County, MD Security Cybersecurity Contractor Rockville, Maryland
  • Detroit Detroit MS Dynamics GP Migration Expert Detroit MS Dynamics GP-Great Plains Upgrade Expert Detroit, Wayne County

  • 24-7 Two-factor Authentication Computer Consultants
    Immediate ProSight Duo MFA Support

    Progent's Duo services utilize Cisco's Duo technology to protect against password theft by using two-factor authentication. Duo supports single-tap identity confirmation on Apple iOS, Google Android, and other out-of-band devices.

  • Edmonton Telecommuters Endpoint Management Tools Consultants Edmonton Telecommuters Endpoint Management Solutions Guidance Edmonton
  • Exchange Server 2019 Technical Support San Antonio, TX Solution Provider Exchange Server 2013 San Antonio Airport SAT
  • Fresno Remote Workforce Call Desk Outsourcing Assistance Fresno County Fresno At Home Workers Call Desk Outsourcing Expertise Fresno California
  • Great Plains Software Contract Programming FRx Report Design
  • Huntington Beach Consulting Companies Huntington Beach Computer Specialists

  • Top Data Protection Manager 2016 and Hyper-V Network Consultants
    Data Protection Manager 2016 and Azure Setup and Support

    System Center 2016 Data Protection Manager provides near-continuous backup and simplified recovery capabilities for Microsoft networks. Data Protection Manager 2016 delivers application-aware protection for key workloads such as SQL Server, Exchange and SharePoint Server, protects Windows and Linux virtual machines, supports virtual machines hosted by Hyper-V and VMware, and can use Azure for convenient cloud backup and recovery. Progent's Microsoft-certified experts can help businesses of any size to design, implement, manage, and troubleshoot a multi-site backup/restore system built around Data Protection Manager 2016. Progent can assist you to migrate from a previous release of Data Protection Manager or from a legacy solution, and Progent can optimize your DPM 2016 ecosystem for on premises, hosted, cloud or hybrid deployments. Progent offers online or onsite support and can deliver as-needed expertise to help you through technical bottlenecks or deliver comprehensive project management services to make sure you finish your Data Protection Manager 2016 deployment on schedule and within your budget.

  • Knoxville Ransomware Hermes Vulnerability Evaluation Knoxville, TN Knoxville Ransomware Preparedness Checkup Knoxville
  • Madison, US BlackBerry Software IT Consulting Firms BlackBerry Wireless Small Business Computer Consulting Firm Madison, United States
  • Motor City Work from Home Employees Detroit Consulting Experts - Security Solutions Consulting and Support Services Work at Home Employees Consulting Experts near me in Detroit - Endpoint Security Solutions Consultants Detroit Michigan
  • Two-factor Authentication Computer Engineer
  • Network Consult Rhode Island Rhode Island Network Consulting Services

  • Security Audits CISM
    CISM Certified Cybersecurity Management Consultancy

    Progent offers the support of CISM Certified security professionals. The Certified Information Security Manager (CISM) organization describes the basic competencies and worldwide standards of skill that information security professionals are expected to learn. CISM provides business management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide efficient security management and support services.

  • Reading Work at Home Employees Reading Guidance - Conferencing Technology Consulting Experts Reading Work at Home Employees Consultants nearby Reading - Video Conferencing Solutions Assistance
  • Reston Ransomware WannaCry Susceptibility Checkup Reston-Ashburn Reston Ransomware Ryuk Susceptibility Checkup Reston-Ashburn, VA
  • Sandy Springs-Cumberland Work from Home Employees Consulting Services near me in Sandy Springs - Collaboration Technology Consulting Experts Sandy Springs-Cumberland, GA Offsite Workforce Guidance near Sandy Springs - Collaboration Solutions Consulting Experts
  • Sarasota Expertise for Network Support Providers Fargo-Grand Forks, ND Consultants for Sarasota Computer Support Providers Fargo-Cass County, ND
  • Short-Term IT Support Staffing Help Consulting Expertise Rockville-Fredrick, Maryland IT Staffing Temps for Network Service Organizations Rockville-Gaithersburg, Maryland
  • Thousand Oaks Ryuk Crypto-Ransomware Filtering Thousand Oaks, CA Thousand Oaks Sodinokibi Crypto-Ransomware Data-Recovery
  • Top Midtown Manhattan Remote Workers Set up Consultants NYC-Upper West Side, New York Midtown Manhattan Work from Home Employees Integration Solutions Consulting NYC-Upper West Side
  • Uniondale Offsite Workforce Solutions Consultants Uniondale Offsite Workforce Consulting near Uniondale - Solutions Guidance Uniondale-Garden City, New York, USA

  • Penetration Testing Cybersecurity Tech Services
    Firewall Configuration Security Penetration Testing

    Stealth penetration testing is an important component of any comprehensive IT system security strategy. Progent's security experts can perform extensive intrusion tests without the knowledge of your company's in-house network support staff. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event history analysis are correctly set up and actively observed.

  • Uniondale Telecommuters Collaboration Systems Assistance Teleworkers Uniondale Consulting Experts - Collaboration Solutions Consulting Experts Uniondale NY
  • Wi-Fi Site Survey and Planning Technical Support Predictive Wi-Fi Site Modeling Configuration

  • © 2002-2022 Progent Corporation. All rights reserved.